On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

Size: px
Start display at page:

Download "On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems"

Transcription

1 On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, V. Lesser University of Massachusetts at Amherst, USA, Abstract We consier a common task in multiagent systems where agents nee to estimate the state of an uncertain omain so that they can act accoringly. If each agent only has partial knowlege about the omain an local observations, how can the agents accomplish the task with a limite amount of communication? Multiply sectione Bayesian networks (MSBNs) provie an effective an exact framework for such a task but also impose a set of constraints. Are there simpler frameworks with the same performance but with less constraints? We ientify a small set of high level choices which logically imply the key representational choices leaing to MSBNs. The result aresses the necessity of constraints of the framework. It facilitates comparisons with relate frameworks an provies guiance to potential extensions of the framework. (Keywors: multiagent system, ecentralize interpretation, communication, organization structure, uncertain reasoning, probabilistic reasoning, belief network, Bayesian network) I. INTRODUCTION As intelligent systems are being applie to larger, open an more complex problem omains, many applications are foun to be more suitably aresse by multiagent systems [25], [27]. Consier a large uncertain problem omain populate by a set of agents. The agents are often charge with many tasks etermine by the nature of the application. One common task is to estimate what is the true state of the omain so that they can act accoringly. Such a task, often referre to as istribute interpretation [5], arises in many applications of multiagent systems incluing equipment/process troubleshooting, builing/area surveillance, battle fiel/isaster situation assessment, an istribute esign. We can escribe the omain with a set of variables. Some variables are not irectly observable hence their values can only be inferre base on observations of other variables an backgroun knowlege about their epenence relations. Furthermore, each agent has only a partial perspective of the problem omain. That is, each agent only has knowlege about a subomain, i.e., about the epenence among a subset of omain variables, an can only observe an reason within the subomain. The agents may be evelope by ifferent esigners an the subomain knowlege may be private to their esigners. Hence, maintaining the privacy of the agents while they are cooperating may be esirable. In the case of a single agent, the task of estimating the state of the omain can be achieve by representing the omain knowlege in a Bayesian network (BN) [2] an by performing probabilistic inference using the BN given the agent s observations. However, as multiple agents are cooperating on the task, a set of new issues arise: How shoul the omain be partitione into subomains? How shoul each agent represent its knowlege about a subomain? How shoul the knowlege of each agent relate to that of others? How shoul the agents be organize in their activities? What information shoul they exchange an how, in orer to accomplish their task with a limite amount of communication? Can they achieve the same level of accuracy in estimating the state of the omain as that of a single centralize agent? Multiply sectione Bayesian networks (MSBNs) [28] provie one solution to these issues. An MSBN consists of a set of interrelate Bayesian subnets each of which encoes an agent s knowlege concerning a subomain. Agents are organize into a hypertree structure such that inference can be performe in a istribute fashion while answers to queries are exact with respect to probability theory. Each agent only exchanges information with ajacent agents on the hypertree, an each pair of ajacent agents only exchange their beliefs on a set of share variables. Both local inference within an agent an communication among all agents are efficient when the agent subnets are sparse. Therefore, MSBNs provie a framework in which multiple agents can estimate the state of a omain effectively with exact an istribute probabilistic We shall use the term effective to mean efficient computation when agent subnets are sparse.

2 2 y z g5 e z2 _ w9 i 4 x v7 y v4 g g7 n s x5 t9 z4 _ t8 l 8 v g3 x3 w6 2 w _ u y2 t2 r o 3 a2 6 n o 7 p q b2 g4 U c U g2 b a f g _ v5 z3 t i w7 k _ s g8 g9 q s2 5 p t6 U 3 w8 v6 z t t3 k h2 i2 f w5 w2 _ t4 x4 e2 U 2 z5 t5 t7 j2 _ y4 q2 9 _ l2 _ m2 g6 o2 U 4 n2 _ Fig.. A igital system. inference. In principle, the framework allows unboune number of agents as well as allows agents to join an leave ynamically. Are there simpler alternatives that can achieve the same performance? In other wors, are the technical constraints of MSBN necessary? For example, the hypertree organization of agents prevents an agent from communicating irectly an arbitrarily with another agent. Is this necessary? The agent interface is require to satisfy a conition calle -sepset (etaile in the paper). Is it necessary? In this work, we aress these issues. We show that given some reasonable funamental choice/assumptions, the key constraints of an MSBN, such as a hypertree structure an a -sepset agent interface, follow logically. In particular, we ientify the choice points in the formation of the MSBN framework. We term the funamental choices as basic commitments (BCs). Given the BCs, other technical choices are entaile. Hence, an MSBN or some equivalent follows once we amit the BCs. The contributions of this work are the following: First, the analysis provies a high-level (vs. technical level) escription of the applicability of MSBN an aresses issues regaring the necessity of major MSBN representational constraints. Secon, the results facilitate comparison with alternative frameworks. Thir, the analysis provies a guieline for extensions or relaxations of the MSBN framework as to what can or cannot be trae off. In Section II, we briefly overview the MSBN framework with representational choices summarize. Each remaining section ientifies some BCs an erives implie choices. II. OVERVIEW OF MSBNS A BN [2] is a triplet where is a set of omain variables, is a DAG whose noes are labele by elements of, an is a joint probability istribution (jp) over, specifie in terms of a istribution for each variable conitione on the parents of in. An MSBN [33], [28] is a collection of Bayesian subnets that together efine a BN. For instance, suppose that a piece of equipment consists of multiple components built by ifferent esigners. As a small example, Figure shows a piece of igital equipment mae out of five components! ". Each box in the figure correspons to a component an contains the logical gates an their connections with the input/output signals of each gate labele. A set of five agents, #$ %&! " respectively associate with a component ', cooperate to monitor the system an trouble-shoot it when necessary. Each agent #( is responsible for a particular component ), which is likely being evelope by the esigner of the component. When a gate is enclose in exactly one box, the gate is physically locate in the corresponing component an is logically known only to the agent responsible for the component. On the other han, when a gate is enclose in more than one box, the gate is physically locate in only one of the components but is logically known to all the corresponing agents. For

3 3 Fig. 2. The subnet for. Fig. 3. The subnet for. example, the AND gate is known only to #, the OR gate is known to both # an #, an the signal is known to #, # an #. The knowlege of an agent about its assigne component can be represente as a BN, calle a subnet. The subnet for agent # (responsible for component ) is shown in Figure 2 an that for # is shown in Figure 3. Each noe is labele with a variable name. Only the DAGs of the subnets are shown in the figures with the conitional probability istribution for each variable omitte. As mentione above, an agent not only knows all evices locate in its assigne component, but also knows some evices that are physically locate in other interfacing components. Hence, each subnet encoes the agent s knowlege on both types of evices. The five subnets (one for each component) collectively efine an MSBN, which form the core knowlege of the multiagent system. Base on this knowlege an limite observations, agents can cooperate to estimate whether the system is functioning normally, an if not, which evices are likely to be responsible. For instance, suppose that the gates (in ) an (in ) in Figure break own an prouce incorrect output. Some outputs ownstream are also affecte. Equipment inputs an correct evice outputs are shown in Figure by an. Incor-

4 4 rect outputs are shown unerline. Through limite local observation (each agent observes the values of 3 to 4 signals incrementally) an communication (two rouns), agents can ientify the two faulty gates [3], [28] cor- rectly (with " # an! ). Subnets in an MSBN are require to satisfy certain conitions. To escribe these conitions, we introuce the terminologies first. Let $ %$ '& be two graphs (irecte or unirecte). an are sai to be graph-consistent if the subgraphs of an spanne by )( are ientical. Given two graphconsistent graphs ( %$ '&, the graph * %$ *+$ is calle the union of an, enote by )*. Given a graph %$, a partition of into an such that )* % an ( -, /., an subgraphs of spanne by $ '&, is sai to be sectione into an. See Figure 4 for an example. Note that if an are f e f e G c c a b a b a g h g G h G i b Fig. 4. The graph in (a) is sectione into an in (b). is the union of2 an. sectione from a thir graph, then an are graphconsistent. The union of multiple graphs an the sectioning of a graph into multiple graphs can be similarly efine. Graph sectioning is useful in efining the epenence relation between variables share by agents. It is use to specify the following hypertree conition which must be satisfie by subnets in an MSBN: Definition : Let %$ be a connecte graph sectione into subgraphs 3 ($ %$ 54. Let the subgraphs be organize into an unirecte tree 6 where each noe is uniquely labele by a ( an each link between 87 an :9 is labele by the non-empty interface #72( 9 such that for each an ;, <( = is containe in each subgraph on the path between $ an >= in 6. Then 6 is a hypertree over. Each ( is a hypernoe i (a) (b) an each interface is a hyperlink. Figure 5 illustrates a hypertree for the igital system, where an are shown in Figures 2 an 3. The Fig. 5. G G 4... G g, g 7, g 8, g 9, i, k, n, o, p, q, r, t 2, y 2, z 2, z4 G G 3 The hypertree for the igital equipment monitoring system. hypertree represents an organization of agent communication, where variables in each hypernoe are local to an agent an variables in each hyperlink are share by agents. Agents communicate in an MSBN by exchanging their beliefs over share variables. We use noes an variables interchangeably when there is no confusion. Noes share by subnets in an MSBN must form a -sepset, as efine below: Definition 2: 2 Let be a irecte graph such that a hypertree over exists. A noe containe in more than one subgraph with its parents in is a -sepnoe if there exists at least one subgraph that contains. An interface? is a -sepset if is a -sepnoe. The interface between an contains 3 variables inicate in Figure 5. The corresponing noes in Figures 2 an 3 are unerline. It is a -sepset because these variables are only share by an, an each variable has all its parents containe in one of them. For instance, the parents of ( an A ) are all containe in, while those of (, CB an ) are containe in both an (see Figures 2 an 3). The structure of an MSBN is a multiply sectione DAG (MSDAG) with a hypertree organization: Definition 3: A hypertree MSDAG D, where each is a DAG, is a connecte DAG such that () there exists a hypertree 6 over, an (2) each hyperlink in 6 is a -sepset. Note that although DAGs in a hypertree MSDAG form a tree, each DAG may be multiply connecte. A loop in a graph is a sequence of noes %E such that the first noe is ientical to the last noe an there is a link Note that this efinition is an extension of earlier efinitions for -sepset, such as that in [28], to the most general case.

5 5 Fig. 6. f e c G a b a b l n m A MSDAG with multiple paths across local DAGs. (not necessarily in the same irection) between each pair of noes ajacent in the sequence. Such a loop is also referre to as an unirecte loop. A DAG is multiply connecte if it contains at least one (unirecte) loop. Otherwise, it is singly connecte. For example, in Figure 2 has two loops. One of them is!. Hence, is multiply connecte. in Figure 3 has several loops an is also multiply connecte. Moreover, multiple paths may exist from a noe in one DAG to another noe in a ifferent DAG after the DAGs are unione. For instance, in Figure 6, there are several (unirecte) paths from noe E in to noe in. There is one path going through noes, an ; an another path goes through,, an. Each path goes across all three DAGs. An agent s quantitative knowlege about the strength of epenence of a variable on its parent variables can be encoe as a conitional probability istribution!. 2! is a special case of a potential over 3 4 *. A potential over a set of variables is an non-negative istribution of at least one positive parameter. For instance, the following table illustrates a potential over two variables an its parent. It G TABLE I A POTENTIAL OVER A SET OF VARIABLES THAT REPRESENTS A PROBABILITY DISTRIBUTION o j k j k ' & & & & & may represent the probability istribution 2 in the last column. One can always convert into 2 by iviing each potential value with a proper sum: an operation terme normalization. For instance, after iviing the first two values in by their sum 4, we obtain the probability values # an &<. After iviing the last two g h G 2 i values in by their sum, we obtain the probability values # & an &< &. Hence, ' contains the same information as 2 with the flexibility of not having to perform the normalization until it is neee. A uniform potential is one with all its potential values being. An MSBN is then efine as follows. Uniform potentials are use to ensure that quantitative knowlege about the strength of epenence of a variable on its parent variables will not be oubly specifie for the same variable. Definition 4: An MSBN is a triplet!. D is the omain where each is a set of variables. D (a hypertree MSDAG) is the structure where noes of each DAG ( are labele by elements of. Let be a variable an be all the parents of in. For each, exactly one of its occurrences (in a containing 3!4 * ) is assigne 2!, an each occurrence in other DAGs is assigne a uniform potential. #" ' is the jp, where each is the prouct of the potentials associate with noes in. A triplet ' is calle a subnet of. Two subnets an = are sai to be ajacent if an = are ajacent on the hypertree MSDAG. MSBNs provie a framework for the task of estimating the state of an uncertain omain in cooperative multiagent systems. Each agent hols its partial perspective (a subnet) of a omain, reasons about the state of its subomain with local observations an through limite communication with other agents. Each agent may be evelope by an inepenent esigner an the internals of an agent (agent privacy) are protecte. Agents can acquire observations in parallel while their beliefs about the states of iniviual subomains are consistent with observations acquire by all agents. For the igital system example, each component is assigne an agent # in charge of the subnet an its local computation. The representational choices of MSBNs are summarize below, where the most important ones are 3 an 6. ) Each agent s belief is represente by Bayesian probability. 2) The omain is ecompose into subomains. For each pair, there exists a sequence of subomains such that every pair of subomains ajacent in the sequence shares some variables. 3) Subomains are organize into a (hyper)tree structure where each hypernoe is a subomain, an each hyperlink represents an non-empty set of share variables between the two hypernoes such that variables share by any two hypernoes are also share by each hypernoe on the path between

6 6 them. 4) The epenency structure of each subomain is represente by a DAG. 5) The union of DAGs for all subomains is a connecte DAG. 6) Each hyperlink is a -sepset. 7) The joint probability istribution can be expresse as in Definition 4. Below we ientify a set of BCs leaing to these choices. III. ON COMMUNICATION GRAPHS We use uncertain knowlege, belief an uncertainty interchangeably, an make the following basic commitment: BC : Each agent s belief is represente by Bayesian probability. It irectly correspons to the choice of Section II. We shall use coherence to escribe any assignment of belief consistent with the probability theory. We consier a omain of variables populate by cooperative agents # #. Each # has knowlege over, calle the subomain of #. For example, in equipment monitoring, each correspons to a component incluing all its evices an their input/output signals. Although not require in theory, practically it is assume whenever ( =,., the intersection is small relative to an =. From BC, the knowlege of # is a probability istribution over, enote by '. To minimize communication, we allow agents to exchange only their beliefs on share variables (BC 2 below). We take it for grante that for agents to communicate irectly, ( <= must be nonempty. Note that BC 2 oes not restrict the orer nor the number of communications. BC 2: # an # = can communicate irectly only with #( <=. We refer to ( <= as a message an refer to irect communication as message passing. We emphasize that the funamental property of message passing (as use in this paper) is that the messages normally reveal only partial information known to the sener. In other wors, neither a single message nor all the messages from a sener collectively isclose all the information that the sener has. Paths for message passing can be represente by a communication graph (CG): In a graph with noes, associate each noe with an agent #( an label it by. Connect each pair of noes an = by a link labele.. Figure 7 shows the communication graph of the multiagent system for monitoring the igital system from Figure. The subomains an their intersections are shown below: by? ( = if?, V I, V 4 I I,2,2 V 3 2 I Fig. 7. The communication graph of the multiagent system for monitoring the igital system. I 2, ; B B A A A A 4 3 A 4 3 ; B A %E A! 4 %E CB! A)B! 4 CB!! A!! B!!! 4? 3 %E! 4? 3 4? 3 B! 4? 3 A! 4? 3! ; B A! 4 In fact, a communication graph is an application of a general class of graphs calle junction graphs [9]. Although our focus is on communication graphs, many of their relevant properties are intrinsic to all junction graphs. Therefore, we shall escribe these properties in terms of junction graphs whenever it is appropriate. Definition 5 efines junction graphs formally. We use to enote the power set of a set. Definition 5: A junction graph is a triplet %$. is an non-empty set calle the generating set. is a subset of such that *. Each element of is calle a cluster. $ is efine as $ 3! (" #, ($ -. 4, 2,4 V V

7 7 where each unorere pair is calle a separator between the two clusters an, an is labele by the intersection (". In Figure 7, the generating set is the set of all variables in the igital system omain. Each cluster correspons to one component subomain. The separators in a CG represent all potential paths for message passing among agents. As the belief of one agent can influence the belief of another agent through a thir agent, CG also represents all potential paths for inirect communications. Each agent s belief shoul potentially be influential in any other, irectly or inirectly. Otherwise the system can be split into two. Hence, CG is connecte. We summarize this in Proposition 6. It is equivalent to Choice 2 in Section II. Recall that BC stans for basic commitment. Proposition 6: Let be the communication graph over that observes BC an BC 2. If each agent s belief can in general influence that of each other agent through communication, then is connecte. A CG contains all possible paths for agent communication. If we remove some separators from a CG, the agent communication is effectively restricte to a proper subset of potential paths. The resultant graph is a cluster graph as efine below. Definition 7: Let %$ be a junction graph an $ $. Then %$ is a cluster graph over. Note that a junction graph is also a cluster graph, but a cluster graph may not be a junction graph. Cluster graphs of a CG represents alternative organizations for agent communication, which will be stuie in the next section. IV. ON HYPERTREE ORGANIZATION A. Classification of loops The ifficulty of coherent inference in multiply connecte graphical moels (those with loops) of probabilistic knowlege is well known an many inference algorithms have been propose. Those base on message passing, e.g., [2], [4], [], [23], [4], all convert a multiply connecte network into a tree. However, no formal arguments can be foun, e.g., in [2], [9], [8], [3], which emonstrate convincingly that message passing cannot be mae coherent in multiply connecte networks. 3 This leaves the question whether it is impossible to construct In fact, this issue has never been raise openly to the authors knowlege. Pearl [2] explaine that his algorithm for message passing in tree-structure BNs woul not work correctly in multiply connecte BNs because the assumptions that lea to the algorithm woul not hol. He i not, however, treat the issue in general. In fact, an empirical stuy [7] has been performe recently to apply to multiply connecte BNs for approximate inference. such a metho or the metho remains to be iscovere, uner the constraints that each noe in the network is associate with only a local istribution an it is never passe to a central location for manipulation. The answer to this question ties closely to the necessity of the hypertree organization of agents as specifie in Definition 3 an restate as the choice 3 in Section II. This tie can be seen by noting that the hypertree in Definition 3 is isomorphic to a subgraph of the communication graph of the same multiagent system: A one-to-one mapping exists between hypernoes in Definition 3 an noes in. Each hyperlink in Definition 3 is a link in but the converse is not true. Compare Figures 5 an 7 as an example. In what follows, we show that in general, coherent message passing is impossible in general, multiply connecte CGs. The result formally establishes the necessity of hypertree structure for uncertain omain state estimation by multiagent message passing. We first classify loops on a cluster graph as follows: Definition 8: Let be a cluster graph over an be a loop in. If there exists a separator on that is containe in every other separator on, then is a egenerate loop. Otherwise, is a nonegenerate loop. A egenerate loop is a strong egenerate loop if all separators on are ientical. Otherwise, is a weak egenerate loop. An nonegenerate loop is a strong nonegenerate loop if ( -., where is over every separator on. Otherwise, is a weak nonegenerate loop.,e b,c, a,b b b,c, a c,f,g (a) a,e e c,e (c),e,i a,b,f b,f,i b,c,,i b,c,,f a,f c,f,f,h,h,g,h a,e,f e,f c,e,f (b) () Fig. 8. Cluster graphs where each cluster is shown as an oval an each separator is shown in a box. In Figure 8, all loops in (a) an (b) are egenerate. The loops in (a) are strong egenerate loops, an the loop in (b) is a weak egenerate loop. The loops in (c) an () are nonegenerate. The loop in (c) is a strong nonegenerate loop, an that in () is a weak nonegenerate loop. In general, a cluster graph can contain both types of loops an can contain strong an weak loops for each type.

8 8 B. Nonegenerate loops We show that when nonegenerate loops exist, messages are uninformative. No matter how messages are manipulate or route, they cannot become informative an it becomes impossible to make message passing coherent. b a c (a) a,b b a b,c, c a,c (b) Fig. 9. (a) A epenence structure over four variables. (b) The junction graph for the variables in (a). Consier a omain with the epenence structure in Figure 9 (a) where %E are binary (i.e., 3 4, 3 4, an so on). It is populate by three agents # ( '& ) with 3 4, 3 %E4 an 3 %E 4. Although the system appears trivial, it will be expane to arbitrary complexity below. Figure 9 (b) is the communication graph. The local knowlege of agents are, %E an %E, respectively. We assume that their beliefs are initially consistent, namely, the marginal istributions satisfy, (, an E $ E. Due to BC 2, message passing cannot change any agent s belief. We refer to the system as Mas3 (meaning a multiagent system of 3 agents). Any given, %E an %E subject to the above consistency is calle an initial (belief) state of Mas3. Suppose that # observes. If the agents can upate their beliefs coherently, their new beliefs shoul be, %EC an %E. For #, %E can be obtaine locally. However, for # an # to upate their beliefs, they must rely on the message sent by # to # an the message EC sent by # to #. In the following, we show that # an # cannot upate their beliefs coherently base on these messages. Before the general result, we illustrate with a particular initial state. From Figure 9, we can inepenently specify,, EC, an %E as follows: < E E < %E < %E < %E %E From these, we efine an initial state which is consistent: < %E EC %E %E %E where %E ' EC. After is observe by #, its messages are < an EC ". Consier next a ifferent initial state that iffers from %E with %E as follows: < %E < %E && %E & by replacing Note that < < %E %E, %E, but an %E %E. After is ob- an EC are com- serve, if the messages pute, they are foun to be ientical to those obtaine from the state. That is, the messages are insensitive to the ifference between the two initial states. As the consequence, the new beliefs in # an # will be ientical in both cases. Shoul the new beliefs in both cases be ifferent? Using the coherent probabilistic inference, the new belief is obtaine from, an is obtaine from. The ifference is significant. We now show that the above phenomenon is not acciental. Without losing generality, we assume that all istributions are strictly positive. Lemma 9 says that for infinitely many ifferent initial states of agent #, its messages to # an #, however, are ientical. Lemma 9: Let be a strictly positive initial state of Mas3. There exists an infinite set. Each element is an initial state of Mas3 ientical to in,, %E such that the message an EC but istinct in prouce from is ientical to that prouce from, an so is the message E. Proof: We enote the message component C from state by. We enote the message component from by <. < can be expane as & & < &!! Similarly, the message component E < can be expane as E < &" & # #

9 ( By assumption,, %E %E an %E %E but %E, %E. If agent # at generates the ientical messages an E EC (conclusion of the lemma), then %E must be the solution of the following equations:!!!!! %E has four inepenent parameters but! Because is constraine by only two equations, it has infinitely many solutions. Each solution efines an initial state of Mas3 that satisfies all conitions in the lemma. Lemma says that with the same ifference in initial states, a coherent inference will prouce istinct results from Mas3. Lemma : Let an be strictly positive probability istributions over the DAG of Figure 9 such that they are ientical in, an EC but istinct in %E. Then is istinct from in general. Proof: The following can be obtaine from an : %E %E %E () %E (2) where %E is use because is ientical with in, an E. If %EC, %EC (which we shall show below), then in general,. We have!" # $ &%$ % $ % ' $ % (" # % ) Because %E, that %E, %E, in general, it is the case %EC. We conclue with the following theorem: Theorem : Message passing in Mas3 cannot be coherent in general, no matter how it is performe. Proof: By Lemma 9, an EC are insensitive to the initial states an hence the posteriors (e.g., ) compute from the messages cannot be sensitive to the initial states either. However, by Lemma, the posteriors shoul be ifferent in general given ifferent initial states. Hence, correct belief upating cannot be achieve in Mas3. Note that the non-coherence of Mas3 is ue to its nonegenerate loop. From Eqs.() an (2), correct inference requires %EC. To pass such a message, a separator must contain 3 %E4, the intersection between 9 an *. The nonegenerate loop signifies the splitting of such a separator (into separators 3 4 an 3 E4 ). The result is the passing of marginals of %EC (the insensitive messages) an ultimately the incorrect inference. We can generalize this analysis to an arbitrary, strong nonegenerate loop of length 3 (the loop length of Mas3), where each of E is a set of variables. The result in Lemmas 9, an Theorem can be similarly erive. We can further generalize this analysis to an arbitrary, strong nonegenerate loop of length *,+. By clumping *.- ajacent subomains into one big subomain, the loop is reuce to length 3. Any message passing among the /- subomains can be consiere as occurring in the same way as before the clumping but insie. Now the above analysis for an arbitrary strong nonegenerate loop of length 3 applies. Furthermore, the result can be generalize to an arbitrary, weak nonegenerate loop of length *,. Let 2 the separator between an ( be *8- &, the separator between an be, an 9 ;:. Let the potential of each cluster be =< ( 9 =< B9 =< B9 B9 may be ifferent ue to an observation on D9 available to $ but not to )=. This is possible when the object associate with is physically locate with the agent associate with an is only logically known to the agent associate with 8=. Message passing in can be consiere as inepenently passing of two message streams, one etermine by ><?E9 9 an one etermine by =< B9. For example, the message from to is F?G9 9 B9 where >?H9 9 can be obtaine by marginalization of F?G9 9. The first message stream accoring to =< (?I9 9 is equivalent to the message passing in a strong nonegenerate loop where each cluster (@?E9. Accoring to the above analysis, belief upating cannot be achieve by message passing in. The secon message stream relative to

10 4 =< B9 is straightforwar. It in general has no impact on the first message stream. Therefore, belief upating cannot be achieve by message passing in in general. To summarize, the ifficulty will arise whenever a cluster graph contains nonegenerate loops, whether they are strong or weak. This is state in the following Corollary. Corollary 2: Message passing in a cluster graph with nonegenerate loops cannot be coherent in general, no matter how it is performe. C. Degenerate loops In a strong egenerate loop, all subomains share the same separator an it is straightforwar to pass the message coherently. Furthermore, the coherent message passing can be performe with any one separator omitte. That is, it can be performe with the loop cut open into a chain. Next, consier a weak egenerate loop where separators are not all ientical, but there exists a separator that is containe in each other separator. Let the loop be where *. Let the clusters connecte by be an. There are two paths between an, 2 The message that can be passe from to along is a potential % Because the message passe along any separator, potential? can be expresse as a which contains, the path is reunant: the same information can be propagate through the other path. Therefore, whether or not coherent message passing is achievable in a weak egenerate loop can be etermine using the cluster chain obtaine by breaking the loop at. For example, whether coherent message passing is achievable in the cluster graph in Figure (a) can be etermine by eleting the separator 3 4 to obtain (b). Similarly, whether coherent message passing is achievable in the cluster graph in Figure (a) can be etermine by eleting a separator 3 4 to obtain (b). Coherent message passing is achievable in Figure (b) using any well-known methos [4], [9], [24]. Hence, it is also achievable in (a) because one can always ignore the existence of the separator that is omitte in (b). On the other han, coherent message passing is not achievable in general in Figure (b) as exemplifie in Figure 2. The potential of each cluster is shown in terms Fig.. Fig.. a,b,v v,e,v a,b,v,e,v b,v,v b,v,v b,c,v c,v c,,v b,c,v c,v c,,v (a) (b) The weak egenerate loop in (a) is broken into a chain in (b). a,b,u u a,b,u u,e,u u,e,u u u c,,u c,u b,c,u c,,u c,u b,c,u (a) (b) The weak egenerate loop in (a) is broken into a chain in (b). of a single non-zero probability value (with zero being the value of other probabilities). Clearly, the message on the separator 3 4 is /& /& for each corresponing cluster. The message on the separator 3 E is E & & &. Therefore, no matter how message passing is performe, none of the cluster potentials will change. However, accoring to the cluster 3 E 4, we have & &, but accoring to the cluster 3 4, we have &. Because the separator between the clusters 3 4 an 3 %E 4 in (a) cannot help solve the problem, coherent message passing is also not achievable in Figure (a).

11 P(a=,b=,u=)=. a,b,u u,e,u P(=,e=,u=)=. Fig. 2. u P(c=,=,u=)=. c,,u c,u b,c,u P(b=,c=,u=)=. Each pair of ajacent clusters are consistent. The key conclusion here is that the loopy structure of a weak egenerate loop is insignificant just as that of a strong egenerate loop, in the sense that whether it provies support to coherent message passing can be stuie reliably from a erive chain structure. Hence, a cluster graph with only egenerate loops can always be treate by first breaking the loops at appropriate separators. The resultant is a cluster tree. With the unerstaning of the properties of ifferent types of loops, we now make a choice on the organizational structure for agent communication. Given any connecte graph, its connecte spanning subgraphs (containing the same set of noes as ) with the minimum number of links are trees. That is, trees are the simplest (with the minimum number of links) subgraphs that retain connecteness. Simplicity is conuctive to efficiency. Consier a weak egenerate loop in a CG, where a separator is containe in every other separator. If we use the loopy communication organization, there are two information channels between any two clusters in the loop: one through an one through the other path in the loop. Because each separator in the other path is a superset of (by efinition of weak egenerate loop), from BC 2, the information capacity of the path through is inferior to the other path. This implies that not all messages can be passe equivalently from both paths. Hence, agents must select the path carefully epening on the content of their messages. Clearly, this requires more sophisticate computation an coorination than what woul be require in a tree organization. We therefore prefer a simpler organization of agents when egenerate loops exist in the CG: BC 3: A simpler agent organization (as a subgraph of the communications graph) is preferre. From BC 3, a tree organization follows. This is summarize in the following proposition, which implies the choice 3 in Section II. Proposition 3: Let a multiagent system be one that observes BC through BC 3. Then a tree organization of agents shoul be use. Proposition 3 amits many tree organizations. Jensen [9] showe that coherent message passing may not be achieve with just any tree. In particular, if two subomains an = share a subset? of variables but? is not containe in every subomain on the path between them in the tree, then coherent message passing is not achievable. In fact, the cluster tree in Figure (b) suffers precisely this problem. To ensure coherent message passing, the tree must be a junction tree, where for each pair of an =, ( = is containe in every subomain on the path between an =. Note the similarity between a junction tree an a hypertree in Definition. Hence, we have the following proposition: Proposition 4: Let a multiagent system be one that observes BC through BC 3. Then a junction tree organization of agents must be use. V. ON SUBDOMAIN SEPARATORS Given the commitment to a (hyper) junction tree organization, it follows that each separator must be chosen such that the message over it is sufficient to convey all the relevant information from one subtree to the other. Let enote the set of variables in the separator, enote the union of all subomains of one subtree inuce by the separator excluing, an enote the union of all subomains of the other subtree excluing. By BC 2, is the only information that can be irectly communicate between an. Note that because we are concerne with as the separator between an, we can safely ignore the fact that (or ) is istribute among multiple agents. We consier the conition uner which the messages between * an * through are sufficiently informative to ensure coherent message passing. Suppose is associate with a potential an with %. For the isjoint sets,, an of variables, enote? [2] if an are conitionally inepenent given. Using the notation, if? hols, then the joint istribution an local istributions, satisfy where. Now suppose some variables in are observe an is upate into. To upate in, pass the message from to, an replace in by

12 2 The message passing is coherent because What if? oes not hol? Consier the epenence structure in Figure 9 (a). If a Bayesian network is efine with the epenence structure, an constructe by the chain rule as then in general,? %E EC %E %E is 3 E 4 oes not hol. It has been shown in Lemmas 9, an Theorem that passing a message over from cluster 3 %E 4 to 3 4 cannot prouce correct posterior in general. The following proposition summerizes the above analysis. Proposition 5: Let, an be isjoint sets of variables with efine. Let * be associate with, an * be associate with. ) If? hols, then message passing can be performe coherently by passing a potential over between an. 2) If? oes not hol, then message passing cannot be performe coherently in general by passing a potential over between an. To conclue, when the separator reners the two subtrees conitionally inepenent, if new observations are obtaine in one subtree by the corresponing agents, coherent belief upate of agents in the other subtree can be achieve by simply passing the upate istribution on the separator. On the other han, if the separator oes not rener the two subtrees conitionally inepenent, passing only the separator istribution will not be coherent in general. Hence, we have the following proposition: Proposition 6: Let a multiagent system be one that observes BC through BC 3. Then each separator in a tree organization must rener subomains in the two inuce subtrees conitionally inepenent. This commitment requires the problem omain to be partitione among agents such that intersections of subomains form conitional inepenent separators in a hypertree organization. VI. CHOICE ON SUBDOMAIN REPRESENTATION Given a subomain, the number of parameters to represent the belief of # through a potential over is exponential on the carinality 5. Graphical moels allow such belief to be compactly represente. We focus on DAG moels as they are the most concise, with the unerstaning that other moels such as ecomposable Markov networks [2], [3], [34] or chain graphs [3] may also be use. This correspons to the choice 4 of Section II. BC 4: A DAG is use to structure each iniviual agent s knowlege. A DAG moel amits an asymmetric an acyclic interpretation of epenence. Once we aopt it for each agent, we must aopt it for the joint belief of all agents: Proposition 7: Let a multiagent system over constructe following BC through BC 4. Then each subomain is structure as a DAG over an the union of these DAGs is a connecte DAG over. Proof: If the union of subomain DAGs is not a DAG, then it has a irecte loop. This contraicts the acyclic interpretation of epenence in iniviual DAG moels. The connecteness is implie by Proposition 6. The choice 5 of Section II now follows. VII. ON INTERFACE BETWEEN SUBDOMAINS We show that the interface between subomains must be structure as a -sepset (Definition 2). This is establishe below through the concept of -separation [2]. Theorem 8: Let 6 be a hypertree over a irecte graph %$. For each hyperlink? which splits 6 into two subtrees over an be respectively,?>? an?)? are -separate by? if an only if each hyperlink in 6 is a -sepset. Before proving the theorem, we explain its rational an importance. Proposition 6 states that each separator in a tree organization must rener subomains in the two inuce subtrees conitionally inepenent. Because -separation captures all graphically ientifiable conitional inepenencies [2], Theorem 8 implies that -sepset is the necessary an sufficient syntactic conition to ensure conitionally inepenent separators. We prove Theorem 8 below: Proof: [Sufficiency] Assume that each hyperlink is a -sepset. We show that for any given hyperlink?, 7?? an?? are -separate by?. Let be a path between?>? an?>? such that all noes in one sie of belong to 2??, all noes in the other sie belong to?>?, an one or more ajacent noes in? are in between. It suffices to show that every such path is blocke by?. Every has at least one -sepnoe. If one -sepnoe on is tail-to-tail or hea-to-tail, then is blocke by?. Consier the case where has only one -sepnoe. We show that cannot be hea-to-hea on. Suppose

13 3 that is hea-to-hea with parents an on. Because is the only -sepnoe on, neither nor is share by an, say, an. This means 3' 4, an 3' 4,. Because is a -sepnoe, there exists a subgraph 7 that contains. Because 7 is either locate in the subtree over or the subtree over or follows that either 3' 4 hols. Given 3' 4 or 3' 4, either, it must hol: a contraiction. Hence, is either tail-to-tail or hea-totail on. Next, consier the case where contains at least two -sepnoes. We show that one of them cannot be heato-hea on. Pick two -sepnoes an on that are ajacent. Such an o exist accoring to how is efine. The an are connecte either by or by "!. In either case, one of them must be a tail noe. [Necessity] Assume that every hyperlink -separates the two subtrees. We show that each hyperlink is a - sepset by contraiction. Suppose that there exists a share noe such that no subgraph contains (hence not every hyperlink is a - sepset). Then there exists a hyperlink? on 6 an there exist nonempty subsets such that,, 2*, an is incomparable with. Because is incomparable with, there exist but,, an but,. The path "!' between an is renere open by? because is hea-to-hea on. Hence,.?>? an?? are not -separate by? : a contraiction. Theorem 8 implies that -sepset is the necessary an sufficient syntactic conition for conitionally inepenent separators uner all possible subomain structures an observation patterns. We emphasize that -sepset is necessary for the most general case, because by restricting subomain structures (e.g., some agent contains only cause relative to other agents but no effect ) or observation patterns (e.g., some agent has no local observation an only relies on others observations), the -sepset requirement may be relaxe. The choice 6 of Section II now follows. From Propositions 4 an 7, an Theorem 8, the following proposition is implie. Proposition 9: Let a multiagent system be constructe following BC through BC 4. Then it must be structure as a hypertree MSDAG. Proof: From BC through BC 4, it follows that each subomain shoul be structure as a DAG an the entire omain shoul be structure as a connecte DAG (Proposition 7). The DAGs shoul be organize into a hypertree (Proposition 4). The interface between ajacent DAGs on the hypertree shoul be a -sepset (Theorem 8). Hence, the multiagent system shoul be structure as a hypertree MSDAG (Definition 3). VIII. ON BELIEF ASSIGNMENT By Propositions 7, the structure of a multiagent system is a connecte DAG. Hence, a joint probability istribution (jp) over the entire omain can be efine by specifying a local istribution for each noe an applying the chain rule. In a multiagent system, a noe can be internal to an agent or share by two or more agents. The istribution for an internal noe can be specifie by the corresponing agent esigner. When a noe is share, it may have ifferent parents in ifferent agents (e.g., Figure 2 an figure3). Because each share noe is a - sepnoe, Definition 2 implies that for each share variable, there exists a subomain containing all the parents of in the entire omain as state in the following lemma: Lemma 2: Let be a -sepnoe in a hypertree MS- DAG *. Let the parents of in ( be!. Then there exists 7 such that 7" D!. If agents are built by the same esigner, then once 2 7! is specifie for,! for each is implie. If agents are built by ifferent esigners, then it is possible that istributions for a -sepnoe at ifferent subnets may be incompatible with one another. For instance, in Figures 2 an 3, # an # may iffer on CB. We make the following basic commitment for integrating inepenently built agents into a multiagent system: BC 5: Within each agent s subomain, the jp is consistent with the agent s belief. For share noes, the jp supplements each agent s knowlege with others. The key issue is to combine agents belief on a share variable to arrive at a common belief. One iea [2] is to interpret the istribution from each agent as obtaine from a sample ata. The combine 2! can then be obtaine from the combine ata sample. In summary, let agents combine their belief for each share. Then, for each share, let jp be consistent with 2 7!, an for each internal, let jp be consistent with 2! hel by the corresponing agent. It s easy to see that the resultant jp is precisely the one efine in Definition 4, state in the following proposition: Proposition 2: Let a multiagent system be constructe following BC through BC 5. Then the jp over is ientical to that of Definition 4. The last choice of Section II now follows. Pooling Propositions 9 an 2 together, the MSBN representation is entaile by the BCs: in

14 4 Theorem 22: Let a multiagent system be constructe following BC through BC 5. Then it must be represente as an MSBN or some equivalent. Before concluing this section, we emphasize that the belief consistency between agents that is require by BC 5 concerns only the share variables an concerns only the backgroun or prior knowlege of agents about these variables. An agent s belief on private variables are not constraine irectly by the beliefs of any other agents (although it will be influence by what other agents have observe). For the share variables, BC 5 requires only that the agents reach an agreement on the prior belief. At run time, ue to local observations, agents beliefs on share variables can become inconsistent. Bringing their beliefs back to consistency will be achieve by agent communication [29]. IX. CONCLUSION From the following basic commitments: [BC ] exact probabilistic measure of belief, [BC 2] communication by belief over small sets of share variables, [BC 3] a simpler organization of agents, [BC 4] DAG for omain structuring, [BC 5] joint belief amitting agents beliefs on internal variables an combining their beliefs on share variables, we have shown that the resultant representation of a cooperative multiagent system is an MSBN or some equivalent. This result ais comparison with relate frameworks. Multiagent inference frameworks base on efault reasoning (e.g., DATMS [6] an DTMS [8]) o not amit BC, nor oes the blackboar [9]. The BDI architecture [22] has been very influential in builing multiagent systems. It primarily eals with representation of an agent s mental state for practical reasoning [26] although it has been extene to eal with communications between agents [7]. Several frameworks for ecomposition of probabilistic knowlege have been propose. Abstract network [2] replaces fragments of a centralize BN by abstract arcs to improve inference efficiency. Similarity network an Bayesian multinet [6] represent asymmetric inepenence where each subnet shares almost all variables with each other subnet. A neste junction trees [] can exploit inepenence inuce by incoming messages to a cluster an it shares all its variables with the nesting cluster. They were not intene for multiagent systems an o not amit BC 2. Among these alternative frameworks, MSBNs are unique in satisfying both BC an BC 2 in one framework. Junction tree base message passing algorithms, e.g., [9], [24], [4], like the above mentione frameworks for probabilistic reasoning with graphical moels, are not intene for multiagent systems. However, one might interpret a cluster in a junction tree as corresponing to an agent an its subomain. Uner such an interpretation, a junction tree representation satisfys BC an BC 2. However, a cluster correspons to a completely connecte set of variables. There is no internal structure an the agent s belief is essentially represente in terms of a joint probability istribution over its subomain. Clearly, both local inference in an agent an communication among agents will be intractable. Hence a junction tree representation uner a multiagent interpretation oes not amit BC4. On the other han, MSBNs allow an agent s internal knowlege to be encoe as a Bayesian subnet. This allows both local inference within an agent as well as communication to be performe efficiently (when the subnets are sparse). This analysis aresses issues on representational constraints require by MSBNs. In particular, the two key technical constraints, hypertree an -sepset interface, are the consequence of BC an BC 2. Efficient methos for verifying these constraints in a multiagent system have been evelope [32], [3]. One useful consequence of BC 2 an the MSBN framework is that the internal knowlege of each agent is never transmitte an can remain private. This ais construction of multiagent systems by agents from inepenent esigners. Multiagent systems commonly stan in two extremes: self-intereste versus cooperative. MSBNs stan in the mile: agents are cooperative an truthful to each other while the internal know-how is protecte. Reasoning an acting in uncertain omains are essential issues for multiagent systems. A recent tren has focuse on moeling using Markov ecision processes (MDP) [2], [35]. It has been shown [] that the computation for solving istribute MDPs is intractable. Hence, heuristics an approximation must be applie. On the other han, probabilistic inference in sparse MSBNs is istribute, exact, an efficient [29]. Therefore, extening MSBNs to probabilistic reasoning an ecision making over extene time perio (as ynamic Bayesian networks [5] exten BNs) provies an alternative representation to the istribute MDP approach. The istribute MDP approach can be viewe as extening the centralize MDP to multiagent systems. The alternative approach can be viewe as extening multiagent uncertain reasoning from static omains to ynamic omains. The result presente in this paper highlights the role of MSBNs in exploring the alternative approach. Furthermore, our analysis provies guiance to extensions an relaxations of the MSBN framework. Less funamental constraints can be relaxe, e.g., BC 4 so that

15 5 other graph moels can be use. BC 3 requires that egenerate loops be broken open in the agent organization. If flexibility in agent communication paths are highly esire, the analysis shows that loopy organizations can be use (with a cost in efficiency) when the loops are certain types of egenerate loops. If subomain structures an observation patterns are less than general, the -sepset restriction can be relaxe. ACKNOWLEDGEMENTS This work is supporte by Research Grant OGP55425 from NSERC of Canaa, by NSF uner Grant No. IIS , an by DARPA an Air Force Research Lab uner F REFERENCES [] D.S. Bernstein, S. Zilberstein, an N. Immerman. The complexity of ecentralize control of Markov ecision processes. In Proc. 6th Conf. on Uncertainty in Artificial Intelligence, Stanfor, 2. [2] C. Boutilier. Multiagent systems: Challenges an opportunities for ecision-theoretic planning. AI Magazine, pages 35 43, Winter, 999. [3] E. Castillo, J. Gutierrez, an A. Hai. Expert Systems an Probabilistic Network Moels. Springer, 997. [4] A. Darwiche. Recursive conitioning. Articial Intelligence, 26(-2):5 4, 2. [5] T.L. Dean an K. Kanazawa. A moel for reasoning about persistence an causation. Computational Intelligence, (5):42 5, 989. [6] D. Geiger an D. Heckerman. Knowlege representation an inference in similarity networks an Bayesian multinets. Artificial Intelligence, 82:45 72, 996. [7] A. Haai. Communication an cooperation in agent systems. In LNAI Volume 56. Springer, Berlin, 996. [8] M.N. Huhns an D.M. Brigelan. Multiagent truth maintenance. IEEE Trans. Sys., Man, an Cybernetics, 2(6): , 99. [9] F.V. Jensen. An Introuction To Bayesian Networks. UCL Press, 996. [] F.V. Jensen, S.L. Lauritzen, an K.G. Olesen. Bayesian upating in causal probabilistic networks by local computations. Computational Statistics Quarterly, (4): , 99. [] U. Kjaerulff. Neste junction trees. In Proc. 3th Conf. on Uncertainty in Artificial Intelligence, pages 294 3, Provience, Rhoe Islan, 997. [2] W. Lam. Abstraction in Bayesian belief networks an automatic iscovery from past inference sessions. In Proc. of AAAI, pages , 994. [3] S.L. Lauritzen. Graphical Moels. Oxfor, 996. [4] S.L. Lauritzen an D.J. Spiegelhalter. Local computation with probabilities on graphical structures an their application to expert systems. J. Royal Statistical Society, Series B, (5):57 244, 988. [5] V.R. Lesser an L.D. Erman. Distribute interpretation: a moel an experiment. IEEE Trans. on Computers, C-29(2):44 63, 98. [6] C.L. Mason an R.R. Johnson. DATMS: a framework for istribute assumption base reasoning. In L. Gasser an M.N. Huhns, eitors, Distribute Artificial Intelligence II, pages Pitman, 989. [7] K.P. Murphy, Y. Weiss, an M.I. Joran. Loopy belief propagation for approximate inference: An empirical stuy. In K.B. Laskey an H. Prae, eitors, Proc. 5th Conf. on Uncertainty in Artificial Intelligence, pages , Stockholm, 999. [8] R.E. Neapolitan. Probabilistic Reasoning in Expert Systems. John Wiley an Sons, 99. [9] H.P. Nii. Blackboar systems: the blackboar moel of problem solving an the evolution of blackboar architectures. AI Magazine, 7(2):38 53, 986. [2] J. Pearl. Probabilistic Reasoning in Intelligent Systems: Networks of Plausible Inference. Morgan Kaufmann, 988. [2] D. Poole, A. Mackworth, an R. Goebel. Computational Intelligence: A Logical Approach. Oxfor University Press, 998. [22] A. Rao an M. Georgeff. Deliberation an its role in the formation of intentions. In B. D Ambrosio, P. Smets, an P.P. Bonissone, eitors, Proc. 7th Conf. on Uncertainty in Artificial Intelligence, pages Morgan Kaufmann, 99. [23] R.D. Shachter, B. D Ambrosio, an B.A. Del Favero. Symbolic probabilistic inference in belief networks. In Proc. 8th Natl. Conf. on Artificial Intelligence, pages 26 3, 99. [24] G. Shafer. Probabilistic Expert Systems. Society for Inustrial an Applie Mathematics, Philaelphia, 996. [25] K.P. Sycara. Multiagent systems. AI Magazine, 9(2):79 92, 998. [26] M. Woolrige. An Introuction to Multiagent Systems. John Wiley & Sons, 22. [27] M. Woolrige an N.R. Jennings. Intelligent agents: theory an practice. Knowlege Engineering Review, (2):5 52, 995. [28] Y. Xiang. A probabilistic framework for cooperative multi-agent istribute interpretation an optimization of communication. Artificial Intelligence, 87(-2): , 996. [29] Y. Xiang. Belief upating in multiply sectione Bayesian networks without repeate local propagations. Inter. J. Approximate Reasoning, 23: 2, 2. [3] Y. Xiang an X. Chen. Cooperative verification of agent interface. In Proc. st Europen Workshop on Probabilistic Graphical Moels. 22. [3] Y. Xiang an H. Geng. Distribute monitoring an iagnosis with multiply sectione Bayesian networks. In Proc. AAAI Spring symposium on AI in Equipment Service, Maintenance an Support, pages 8 25, Stanfor, 999. [32] Y. Xiang, K.G. Olesen, an F.V. Jensen. Practical issues in moeling large iagnostic systems with multiply sectione Bayesian networks. Inter. J. Pattern Recognition an Artificial Intelligence, 4():59 7, 2. [33] Y. Xiang, D. Poole, an M. P. Beoes. Multiply sectione Bayesian networks an junction forests for large knowlege base systems. Computational Intelligence, 9(2):7 22, 993. [34] Y. Xiang, S.K.M. Wong, an N. Cercone. A microscopic stuy of minimum entropy search in learning ecomposable Markov networks. Machine Learning, 26():65 92, 997. [35] P. Xuan, V. Lesser, an S. Zilberstein. Communication in multiagent Markov ecision processes. In Proc. ICMAS Workshop on Game Theoretic an Decision Theoretic Agents, 2.

16 6 AUTHORS PHOTO AND BIO Yang Xiang receive the Ph.D. egree from University of British Columbia, Canaa in 992. He was a Postoctoral Fellow at Simon Fraser University, Canaa, Assistant Professor an then Associate Professor in the Department of Computer Science, University of Regina, Canaa, Visiting Professor at Aalborg University, Denmark, an Visiting Professor at University of Massachusetts, Amherst, USA. He is currently an Associate Professor in the Department of Computing an Information Science an Director of Intelligent Decision Support Systems Laboratory, University of Guelph, Canaa. His research interests inclue uncertain reasoning, probabilistic graphical moels, multiagent systems, knowlege iscovery from ata, an business, meicine an inustry applications of intelligent systems. Victor Lesser receive his Ph.D. from Stanfor University in 972. He has been a Professor of Computer Science at the University of Massachusetts at Amherst since 977. He is a founing fellow of AAAI, an the founing presient of the International Founation for Multi-Agent Systems. His major research focus is on the control an organization of complex AI systems. He has been working in the fiel of Multi-Agent Systems for over 25 years. Prior to coming to the University of Massachusetts, he was a research scientist at Carnegie-Mellon University where he was the systems architect for the Hearsay-II speech unerstaning system, which was the first blackboar system evelope.

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract

The Reconstruction of Graphs. Dhananjay P. Mehendale Sir Parashurambhau College, Tilak Road, Pune , India. Abstract The Reconstruction of Graphs Dhananay P. Mehenale Sir Parashurambhau College, Tila Roa, Pune-4030, Inia. Abstract In this paper we iscuss reconstruction problems for graphs. We evelop some new ieas lie

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES

BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES BIJECTIONS FOR PLANAR MAPS WITH BOUNDARIES OLIVIER BERNARDI AND ÉRIC FUSY Abstract. We present bijections for planar maps with bounaries. In particular, we obtain bijections for triangulations an quarangulations

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem

Throughput Characterization of Node-based Scheduling in Multihop Wireless Networks: A Novel Application of the Gallai-Edmonds Structure Theorem Throughput Characterization of Noe-base Scheuling in Multihop Wireless Networks: A Novel Application of the Gallai-Emons Structure Theorem Bo Ji an Yu Sang Dept. of Computer an Information Sciences Temple

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

Kinematic Analysis of a Family of 3R Manipulators

Kinematic Analysis of a Family of 3R Manipulators Kinematic Analysis of a Family of R Manipulators Maher Baili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S. 6597 1, rue e la Noë, BP 92101,

More information

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace

A Classification of 3R Orthogonal Manipulators by the Topology of their Workspace A Classification of R Orthogonal Manipulators by the Topology of their Workspace Maher aili, Philippe Wenger an Damien Chablat Institut e Recherche en Communications et Cybernétique e Nantes, UMR C.N.R.S.

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Learning Subproblem Complexities in Distributed Branch and Bound

Learning Subproblem Complexities in Distributed Branch and Bound Learning Subproblem Complexities in Distribute Branch an Boun Lars Otten Department of Computer Science University of California, Irvine lotten@ics.uci.eu Rina Dechter Department of Computer Science University

More information

2-connected graphs with small 2-connected dominating sets

2-connected graphs with small 2-connected dominating sets 2-connecte graphs with small 2-connecte ominating sets Yair Caro, Raphael Yuster 1 Department of Mathematics, University of Haifa at Oranim, Tivon 36006, Israel Abstract Let G be a 2-connecte graph. A

More information

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing

CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing CS269I: Incentives in Computer Science Lecture #8: Incentives in BGP Routing Tim Roughgaren October 19, 2016 1 Routing in the Internet Last lecture we talke about elay-base (or selfish ) routing, which

More information

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost

Secure Network Coding for Distributed Secret Sharing with Low Communication Cost Secure Network Coing for Distribute Secret Sharing with Low Communication Cost Nihar B. Shah, K. V. Rashmi an Kannan Ramchanran, Fellow, IEEE Abstract Shamir s (n,k) threshol secret sharing is an important

More information

PART 2. Organization Of An Operating System

PART 2. Organization Of An Operating System PART 2 Organization Of An Operating System CS 503 - PART 2 1 2010 Services An OS Supplies Support for concurrent execution Facilities for process synchronization Inter-process communication mechanisms

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

arxiv: v1 [math.co] 15 Dec 2017

arxiv: v1 [math.co] 15 Dec 2017 Rectilinear Crossings in Complete Balance -Partite -Uniform Hypergraphs Rahul Gangopahyay Saswata Shannigrahi arxiv:171.05539v1 [math.co] 15 Dec 017 December 18, 017 Abstract In this paper, we stuy the

More information

Characterizing Decoding Robustness under Parametric Channel Uncertainty

Characterizing Decoding Robustness under Parametric Channel Uncertainty Characterizing Decoing Robustness uner Parametric Channel Uncertainty Jay D. Wierer, Wahee U. Bajwa, Nigel Boston, an Robert D. Nowak Abstract This paper characterizes the robustness of ecoing uner parametric

More information

Design of Policy-Aware Differentially Private Algorithms

Design of Policy-Aware Differentially Private Algorithms Design of Policy-Aware Differentially Private Algorithms Samuel Haney Due University Durham, NC, USA shaney@cs.ue.eu Ashwin Machanavajjhala Due University Durham, NC, USA ashwin@cs.ue.eu Bolin Ding Microsoft

More information

6.854J / J Advanced Algorithms Fall 2008

6.854J / J Advanced Algorithms Fall 2008 MIT OpenCourseWare http://ocw.mit.eu 6.854J / 18.415J Avance Algorithms Fall 2008 For inormation about citing these materials or our Terms o Use, visit: http://ocw.mit.eu/terms. 18.415/6.854 Avance Algorithms

More information

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract

William S. Law. Erik K. Antonsson. Engineering Design Research Laboratory. California Institute of Technology. Abstract Optimization Methos for Calculating Design Imprecision y William S. Law Eri K. Antonsson Engineering Design Research Laboratory Division of Engineering an Applie Science California Institute of Technology

More information

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING

PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PERFECT ONE-ERROR-CORRECTING CODES ON ITERATED COMPLETE GRAPHS: ENCODING AND DECODING FOR THE SF LABELING PAMELA RUSSELL ADVISOR: PAUL CULL OREGON STATE UNIVERSITY ABSTRACT. Birchall an Teor prove that

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

Fast Fractal Image Compression using PSO Based Optimization Techniques

Fast Fractal Image Compression using PSO Based Optimization Techniques Fast Fractal Compression using PSO Base Optimization Techniques A.Krishnamoorthy Visiting faculty Department Of ECE University College of Engineering panruti rishpci89@gmail.com S.Buvaneswari Visiting

More information

Computer Organization

Computer Organization Computer Organization Douglas Comer Computer Science Department Purue University 250 N. University Street West Lafayette, IN 47907-2066 http://www.cs.purue.eu/people/comer Copyright 2006. All rights reserve.

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Optimal Oblivious Path Selection on the Mesh

Optimal Oblivious Path Selection on the Mesh Optimal Oblivious Path Selection on the Mesh Costas Busch Malik Magon-Ismail Jing Xi Department of Computer Science Rensselaer Polytechnic Institute Troy, NY 280, USA {buschc,magon,xij2}@cs.rpi.eu Abstract

More information

Algebraic transformations of Gauss hypergeometric functions

Algebraic transformations of Gauss hypergeometric functions Algebraic transformations of Gauss hypergeometric functions Raimunas Viūnas Faculty of Mathematics, Kobe University Abstract This article gives a classification scheme of algebraic transformations of Gauss

More information

Distributed Planning in Hierarchical Factored MDPs

Distributed Planning in Hierarchical Factored MDPs Distribute Planning in Hierarchical Factore MDPs Carlos Guestrin Computer Science Dept Stanfor University guestrin@cs.stanfor.eu Geoffrey Goron Computer Science Dept Carnegie Mellon University ggoron@cs.cmu.eu

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics

CS 106 Winter 2016 Craig S. Kaplan. Module 01 Processing Recap. Topics CS 106 Winter 2016 Craig S. Kaplan Moule 01 Processing Recap Topics The basic parts of speech in a Processing program Scope Review of syntax for classes an objects Reaings Your CS 105 notes Learning Processing,

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

Open Access Adaptive Image Enhancement Algorithm with Complex Background

Open Access Adaptive Image Enhancement Algorithm with Complex Background Sen Orers for Reprints to reprints@benthamscience.ae 594 The Open Cybernetics & Systemics Journal, 205, 9, 594-600 Open Access Aaptive Image Enhancement Algorithm with Complex Bacgroun Zhang Pai * epartment

More information

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network

Analytical approximation of transient joint queue-length distributions of a finite capacity queueing network Analytical approximation of transient joint queue-length istributions of a finite capacity queueing network Gunnar Flötterö Carolina Osorio March 29, 2013 Problem statements This work contributes to the

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed.

Here are a couple of warnings to my students who may be here to get a copy of what happened on a day that you missed. Preface Here are my online notes for my Calculus I course that I teach here at Lamar University. Despite the fact that these are my class notes, they shoul be accessible to anyone wanting to learn Calculus

More information

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises

Frequent Pattern Mining. Frequent Item Set Mining. Overview. Frequent Item Set Mining: Motivation. Frequent Pattern Mining comprises verview Frequent Pattern Mining comprises Frequent Pattern Mining hristian Borgelt School of omputer Science University of Konstanz Universitätsstraße, Konstanz, Germany christian.borgelt@uni-konstanz.e

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Causality in Communication: The Agent-Encapsulated Bayesian Network Model

Causality in Communication: The Agent-Encapsulated Bayesian Network Model Causality in Communication: The Agent-Encapsulated Bayesian Network Model Scott Langevin Oculus Info, Inc. Toronto, Ontario, Canada Marco Valtorta mgv@cse.sc.edu University of South Carolina, Columbia,

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

Computer Vision Group Prof. Daniel Cremers. 4. Probabilistic Graphical Models Directed Models

Computer Vision Group Prof. Daniel Cremers. 4. Probabilistic Graphical Models Directed Models Prof. Daniel Cremers 4. Probabilistic Graphical Models Directed Models The Bayes Filter (Rep.) (Bayes) (Markov) (Tot. prob.) (Markov) (Markov) 2 Graphical Representation (Rep.) We can describe the overall

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory

Feature Extraction and Rule Classification Algorithm of Digital Mammography based on Rough Set Theory Feature Extraction an Rule Classification Algorithm of Digital Mammography base on Rough Set Theory Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative

More information

Divide-and-Conquer Algorithms

Divide-and-Conquer Algorithms Supplment to A Practical Guie to Data Structures an Algorithms Using Java Divie-an-Conquer Algorithms Sally A Golman an Kenneth J Golman Hanout Divie-an-conquer algorithms use the following three phases:

More information

Distributed minimum spanning tree problem

Distributed minimum spanning tree problem Distributed minimum spanning tree problem Juho-Kustaa Kangas 24th November 2012 Abstract Given a connected weighted undirected graph, the minimum spanning tree problem asks for a spanning subtree with

More information

Adjacency Matrix Based Full-Text Indexing Models

Adjacency Matrix Based Full-Text Indexing Models 1000-9825/2002/13(10)1933-10 2002 Journal of Software Vol.13, No.10 Ajacency Matrix Base Full-Text Inexing Moels ZHOU Shui-geng 1, HU Yun-fa 2, GUAN Ji-hong 3 1 (Department of Computer Science an Engineering,

More information

Verifying performance-based design objectives using assemblybased vulnerability

Verifying performance-based design objectives using assemblybased vulnerability Verying performance-base esign objectives using assemblybase vulnerability K.A. Porter Calornia Institute of Technology, Pasaena, Calornia, USA A.S. Kiremijian Stanfor University, Stanfor, Calornia, USA

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

NAVAL POSTGRADUATE SCHOOL THESIS

NAVAL POSTGRADUATE SCHOOL THESIS NAVAL POSTGRADUATE SCHOOL MONTEREY, CALIFORNIA THESIS REALIZABLE TRIPLES IN DOMINATOR COLORINGS by Douglas M. Fletcher II June 2007 Thesis Co-Avisors: Ralucca Gera Craig Rasmussen Approve for public release;

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Dual Arm Robot Research Report

Dual Arm Robot Research Report Dual Arm Robot Research Report Analytical Inverse Kinematics Solution for Moularize Dual-Arm Robot With offset at shouler an wrist Motivation an Abstract Generally, an inustrial manipulator such as PUMA

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

ACE: And/Or-parallel Copying-based Execution of Logic Programs

ACE: And/Or-parallel Copying-based Execution of Logic Programs ACE: An/Or-parallel Copying-base Execution of Logic Programs Gopal GuptaJ Manuel Hermenegilo* Enrico PontelliJ an Vítor Santos Costa' Abstract In this paper we present a novel execution moel for parallel

More information

Table-based division by small integer constants

Table-based division by small integer constants Table-base ivision by small integer constants Florent e Dinechin, Laurent-Stéphane Diier LIP, Université e Lyon (ENS-Lyon/CNRS/INRIA/UCBL) 46, allée Italie, 69364 Lyon Ceex 07 Florent.e.Dinechin@ens-lyon.fr

More information

Variable Independence and Resolution Paths for Quantified Boolean Formulas

Variable Independence and Resolution Paths for Quantified Boolean Formulas Variable Inepenence an Resolution Paths for Quantifie Boolean Formulas Allen Van Geler http://www.cse.ucsc.eu/ avg University of California, Santa Cruz Abstract. Variable inepenence in quantifie boolean

More information

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction

New Geometric Interpretation and Analytic Solution for Quadrilateral Reconstruction New Geometric Interpretation an Analytic Solution for uarilateral Reconstruction Joo-Haeng Lee Convergence Technology Research Lab ETRI Daejeon, 305 777, KOREA Abstract A new geometric framework, calle

More information

Rough Set Approach for Classification of Breast Cancer Mammogram Images

Rough Set Approach for Classification of Breast Cancer Mammogram Images Rough Set Approach for Classification of Breast Cancer Mammogram Images Aboul Ella Hassanien Jafar M. H. Ali. Kuwait University, Faculty of Aministrative Science, Quantitative Methos an Information Systems

More information

d 3 d 4 d d d d d d d d d d d 1 d d d d d d

d 3 d 4 d d d d d d d d d d d 1 d d d d d d Proceeings of the IASTED International Conference Software Engineering an Applications (SEA') October 6-, 1, Scottsale, Arizona, USA AN OBJECT-ORIENTED APPROACH FOR MANAGING A NETWORK OF DATABASES Shu-Ching

More information

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks

Coordinating Distributed Algorithms for Feature Extraction Offloading in Multi-Camera Visual Sensor Networks Coorinating Distribute Algorithms for Feature Extraction Offloaing in Multi-Camera Visual Sensor Networks Emil Eriksson, György Dán, Viktoria Foor School of Electrical Engineering, KTH Royal Institute

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

A Plane Tracker for AEC-automation Applications

A Plane Tracker for AEC-automation Applications A Plane Tracker for AEC-automation Applications Chen Feng *, an Vineet R. Kamat Department of Civil an Environmental Engineering, University of Michigan, Ann Arbor, USA * Corresponing author (cforrest@umich.eu)

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication

Additional Divide and Conquer Algorithms. Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Aitional Divie an Conquer Algorithms Skipping from chapter 4: Quicksort Binary Search Binary Tree Traversal Matrix Multiplication Divie an Conquer Closest Pair Let s revisit the closest pair problem. Last

More information

On-path Cloudlet Pricing for Low Latency Application Provisioning

On-path Cloudlet Pricing for Low Latency Application Provisioning On-path Cloulet Pricing for Low Latency Application Provisioning Argyrios G. Tasiopoulos, Onur Ascigil, Ioannis Psaras, Stavros Toumpis, George Pavlou Dept. of Electronic an Electrical Engineering, University

More information

Optimal Distributed P2P Streaming under Node Degree Bounds

Optimal Distributed P2P Streaming under Node Degree Bounds Optimal Distribute P2P Streaming uner Noe Degree Bouns Shaoquan Zhang, Ziyu Shao, Minghua Chen, an Libin Jiang Department of Information Engineering, The Chinese University of Hong Kong Department of EECS,

More information

FMA901F: Machine Learning Lecture 6: Graphical Models. Cristian Sminchisescu

FMA901F: Machine Learning Lecture 6: Graphical Models. Cristian Sminchisescu FMA901F: Machine Learning Lecture 6: Graphical Models Cristian Sminchisescu Graphical Models Provide a simple way to visualize the structure of a probabilistic model and can be used to design and motivate

More information

Learning Polynomial Functions. by Feature Construction

Learning Polynomial Functions. by Feature Construction I Proceeings of the Eighth International Workshop on Machine Learning Chicago, Illinois, June 27-29 1991 Learning Polynomial Functions by Feature Construction Richar S. Sutton GTE Laboratories Incorporate

More information

EXACT SIMULATION OF A BOOLEAN MODEL

EXACT SIMULATION OF A BOOLEAN MODEL Original Research Paper oi:10.5566/ias.v32.p101-105 EXACT SIMULATION OF A BOOLEAN MODEL CHRISTIAN LANTUÉJOULB MinesParisTech 35 rue Saint-Honoré 77305 Fontainebleau France e-mail: christian.lantuejoul@mines-paristech.fr

More information

Overlap Interval Partition Join

Overlap Interval Partition Join Overlap Interval Partition Join Anton Dignös Department of Computer Science University of Zürich, Switzerlan aignoes@ifi.uzh.ch Michael H. Böhlen Department of Computer Science University of Zürich, Switzerlan

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

D-Separation. b) the arrows meet head-to-head at the node, and neither the node, nor any of its descendants, are in the set C.

D-Separation. b) the arrows meet head-to-head at the node, and neither the node, nor any of its descendants, are in the set C. D-Separation Say: A, B, and C are non-intersecting subsets of nodes in a directed graph. A path from A to B is blocked by C if it contains a node such that either a) the arrows on the path meet either

More information

A Well-Behaved Algorithm for Simulating Dependence Structures of Bayesian Networks

A Well-Behaved Algorithm for Simulating Dependence Structures of Bayesian Networks A Well-Behaved Algorithm for Simulating Dependence Structures of Bayesian Networks Yang Xiang and Tristan Miller Department of Computer Science University of Regina Regina, Saskatchewan, Canada S4S 0A2

More information

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11:

Pairwise alignment using shortest path algorithms, Gunnar Klau, November 29, 2005, 11: airwise alignment using shortest path algorithms, Gunnar Klau, November 9,, : 3 3 airwise alignment using shortest path algorithms e will iscuss: it graph Dijkstra s algorithm algorithm (GDU) 3. References

More information

Experion PKS R500 Migration Planning Guide

Experion PKS R500 Migration Planning Guide Experion PKS R500 Migration Planning Guie EPDOC-XX70-en-500E May 2018 Release 500 Document Release Issue Date EPDOC-XX70- en-500e 500 0 May 2018 Disclaimer This ocument contains Honeywell proprietary information.

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques

Politehnica University of Timisoara Mobile Computing, Sensors Network and Embedded Systems Laboratory. Testing Techniques Politehnica University of Timisoara Mobile Computing, Sensors Network an Embee Systems Laboratory ing Techniques What is testing? ing is the process of emonstrating that errors are not present. The purpose

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

Exploring Context with Deep Structured models for Semantic Segmentation

Exploring Context with Deep Structured models for Semantic Segmentation 1 Exploring Context with Deep Structure moels for Semantic Segmentation Guosheng Lin, Chunhua Shen, Anton van en Hengel, Ian Rei between an image patch an a large backgroun image region. Explicitly moeling

More information

Polygon Simplification by Minimizing Convex Corners

Polygon Simplification by Minimizing Convex Corners Polygon Simplification by Minimizing Convex Corners Yeganeh Bahoo 1, Stephane Durocher 1, J. Mark Keil 2, Saee Mehrabi 3, Sahar Mehrpour 1, an Debajyoti Monal 1 1 Department of Computer Science, University

More information

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016

Acknowledgement. Flow Graph Theory. Depth First Search. Speeding up DFA 8/16/2016 8/6/06 Program Analysis https://www.cse.iitb.ac.in/~karkare/cs68/ Flow Graph Theory Acknowlegement Slies base on the material at http://infolab.stanfor.eu/~ullman/ragon/ w06/w06.html Amey Karkare Dept

More information

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM

HOW DO SECURITY TECHNOLOGIES INTERACT WITH EACH OTHER TO CREATE VALUE? THE ANALYSIS OF FIREWALL AND INTRUSION DETECTION SYSTEM HOW O SECURTY TECHNOLOGES NTERACT WTH EACH OTHER TO CREATE VALUE? THE ANALYSS O REWALL AN NTRUSON ETECTON SYSTEM Huseyin CAVUSOGLU Srinivasan RAGHUNATHAN Hasan CAVUSOGLU Tulane University University of

More information

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly

APPLYING GENETIC ALGORITHM IN QUERY IMPROVEMENT PROBLEM. Abdelmgeid A. Aly International Journal "Information Technologies an Knowlege" Vol. / 2007 309 [Project MINERVAEUROPE] Project MINERVAEUROPE: Ministerial Network for Valorising Activities in igitalisation -

More information